key distribution in network security

38
Network Security Network Security Confidentiality Using Confidentiality Using Symmetric Encryption Symmetric Encryption Chapter 7

Upload: babak

Post on 13-Jan-2015

1.904 views

Category:

Education


2 download

DESCRIPTION

Cns 13f-lec07- key distribution

TRANSCRIPT

Page 1: key distribution in network security

Network SecurityNetwork SecurityConfidentiality Using Confidentiality Using Symmetric EncryptionSymmetric Encryption

Chapter 7

Page 2: key distribution in network security

Symmetric Key Cryptography

EncryptionEncryption

““The quick The quick brown fox brown fox jumps over jumps over the lazy the lazy dog”dog”

““AxCv;5bmEseTfid3)AxCv;5bmEseTfid3)fGsmWe#4^,sdgfMwifGsmWe#4^,sdgfMwir3:dkJeTsY8R\s@!r3:dkJeTsY8R\s@!q3%”q3%”

““The quick The quick brown fox brown fox jumps over jumps over the lazy the lazy dog”dog”

DecryptionDecryption

Plain-text input Plain-text outputCipher-text

Same key(shared secret)

Page 3: key distribution in network security

Confidentiality using Symmetric Encryption

• Traditionally symmetric encryption is used to provide message confidentiality

• Consider a typical scenario

– Workstations on LANs access other workstations & servers on LAN

– LANs are interconnected using switches/routers

– With external lines or radio/satellite links

Page 4: key distribution in network security

Points of Vulnerability

Page 5: key distribution in network security

Confidentiality using Symmetric Encryption

• Consider attacks and placement in this scenario– snooping from another workstation– use dial-in to a LAN or a server to snoop– use external router link to enter & snoop– monitor and/or modify traffic on external

links

Page 6: key distribution in network security

Confidentiality using Symmetric Encryption

• Have two major placement alternatives

– Link Encryption

– End-to-End Encryption

Page 7: key distribution in network security

Location of Encryption DeviceLink Encryption

• Encryption devices are placed at each end of the link

• Encryption occurs independently on every link

• All the communication is made secure

• A lot of encryption devices are required

• Decrypt each packet at every switch

• High level of security

Page 8: key distribution in network security

Link Encryption Implications

• All paths must use link encryption

• Each pair of node must share a unique key

– Large number of keys should be provided

Page 9: key distribution in network security

End-to-End Encryption

• Source encrypts and the Receiver decrypts

• Payload encrypted

• Header in the clear

• Only destination and reciever share the key

• High Security: Both link and end-to-end encryptions are needed

Page 10: key distribution in network security

Encryption Across a Packet Switching Network

Page 11: key distribution in network security

Traffic Analysis• When using end-to-end encryption must

leave headers in clear

– So network can correctly route information

• Although content is protected, traffic flow patterns are not

• Ideally want both at once

– End-to-End protects data contents over entire path and provides authentication

– Link protects traffic flows from monitoring

Page 12: key distribution in network security

Placement of Encryption

• Can place encryption function at various layers in OSI Reference Model

– Link encryption occurs at layers 1 or 2

– End-to-End can occur at layers 3, 4, 6, 7

– As move higher, less information is encrypted but it is more secure and more complex with more entities and keys

Page 13: key distribution in network security

Encryption coverage implications of store and forward communications

Page 14: key distribution in network security

Traffic Analysis

• Monitoring of communications flows between parties

– Useful both in military & commercial spheres

• Link encryption obscures header details

– But overall traffic volumes in networks and at end-points is still visible

• Traffic padding can further obscure flows

– But at cost of continuous traffic

Page 15: key distribution in network security

Traffic Padding Encryption Device

Page 16: key distribution in network security

Required Key Protection

CONFIDENTIALITYCONFIDENTIALITY

AVAILABILITYAVAILABILITY

INTEGRITYINTEGRITY

AUTHENTICATIONAUTHENTICATION

Page 17: key distribution in network security

Key Storage• In Files

– Using access control of operating system

• In Crypto Tokens– Smart card, USB crypto token– Supports complete key life-cycle on token

• Generation – storage – use – destruction – provide means to ensure that there is no

way to get a key out

• Key Backup (also known as key escrow)

Page 18: key distribution in network security

Number of keys required to support Arbitrary

connections

Page 19: key distribution in network security

Use of a Key Hierarchy

Page 20: key distribution in network security

Key Renewal• Keys should be renewed

• More available cipher texts may facilitate certain attacks

• How often depends on the crypto algorithm

– Can depend on the amount of encrypted data

– May depend on time (exhaustive key search requires time)

• Regular key renewal can reduce damage in case of (unnoticed) key compromise

• Protocols like SSL/TLS include features for (secret) key renewal

Page 21: key distribution in network security

Key Life-Cycle

Time

Key Generation

Key Destruction

Key Storage and

Usage

Keys must be protected

Requires a secure random source!

Unrecoverable deletion

Page 22: key distribution in network security

Key Distribution

• Means of Exchanging Keys between two parties

• Keys are used for conventional encryption

• Frequent key exchanges are desirable

– Limiting the amount of data compromised

• Strength of cryptographic system rests with Key Distribution Mechanism

Page 23: key distribution in network security

Key Distribution

• Symmetric schemes require both parties to share a common secret key

• Issue is how to securely distribute this key

• Often a secure system failure due to a break in the key distribution scheme

Page 24: key distribution in network security

Key Distribution

• Two parties A and B can have various key distribution alternatives:

1. A can select key and physically deliver to B2. third party can select & deliver key to A & B3. if A & B have communicated previously can

use previous key to encrypt a new key4. if A & B have secure communications with a

third party C, C can relay key between A & B

Page 25: key distribution in network security

Key Distribution Scenario

Page 26: key distribution in network security

Key Distribution Scenario

1. A issues a request to the KDC for a session key– Nonce is also sent– Nonce includes identities of communicating

parties and a unique value

2. KDC sends a response encrypted with A’s secret key KA

– It includes one time session key KS

– Original request message, including the nonce– Message also includes KS and ID of A

encrypted with KB intended for B

Page 27: key distribution in network security

Key Distribution Scenario

3. A stores KS and forwards information for B i.e., EKB

[KS||IDA]

4. B sends a nonce to A encrypted with KS

5. A responds by performing some function on nonce like incrementing

The last two steps assure B that the message it received was not a replay

Page 28: key distribution in network security

Key Distribution Entities

• Key Distribution Center– Provides one time session key to valid

users for encryption• Front end Processor

– Carries out the end to end encryption– Obtains session key from the KDC on

behalf of its host

Page 29: key distribution in network security

Key distribution for symmetric keys

• Key distribution for symmetric keys by a central server (KDC):- fixed number of distributions (for given

n)- However, need security protocol

Page 30: key distribution in network security

Key Distribution Issues Hierarchical Key Control

• Not suitable that a single KDC is used for all the users

• Hierarchies of KDC’s required for large networks

• A single KDC may be responsible for a small number of users since it shares the master keys of all the entities attached to it

• If two entities in different domains want to communicate, local KDCs communicate through a global KDC

• Must trust each other

Page 31: key distribution in network security

Session Key Lifetimes

• Session key lifetimes should be limited for greater security

• More frequently the session keys are exchanged, more secure they become

• For connection oriented protocols, it should be valid for the duration of connection

• For connectionless protocols key should be valid for a certain duration

Page 32: key distribution in network security

Transparent Key Control

• Use of automatic key distribution on behalf of users, but must trust system

1. Host sends packet requesting connection

2. Front End buffers packet; asks KDC for session key

3. KDC distributes session key to both front ends

4. Buffered packet transmitted

Page 33: key distribution in network security

Automatic Key Distribution for Connection-Oriented Protocol

KDC

HOSTHOSTFEP

FEP

FEP

Page 34: key distribution in network security

Decentralized Key Control

• KDCs need to be trusted and protected• This can be avoided by the use of decentralized

key distribution• Decentralized approach requires that each node

be able to communicate in a secure manner • Session key may be established in following way

1. A issues a request to B for a session key and includes a nonce, N1.

2. B responds with a message that is encrypted using the shared secret key• Response includes session key, ID of B, the value

f(N1) and nonce N23. Using the new session key, A returns f(N2) to B

Page 35: key distribution in network security

Decentralized Key Distribution

Page 36: key distribution in network security

Controlling Key Usage• Different types of session keys e.g.,

– Data encrypting key: for general communication across network

– PIN-encrypting key: for PIN used in electronic funds

– File encrypting key: for encrypting files stored on a publicly accessible location

• Avoid using master key instead of session key since some unauthorized application may obtain the master key and exploit it

Page 37: key distribution in network security

Key Distribution

• Session key– Data encrypted with a one-time session

key. At the conclusion of the session the key is destroyed

• Permanent key– Used between entities for the purpose of

distributing session keys

Page 38: key distribution in network security

Summary

• Have considered:– use of symmetric encryption to protect

confidentiality– need for good key distribution– use of trusted third party KDC’s